Foresight of evolving security threats posed by emerging technologies

被引:10
|
作者
Hauptman, Aharon [1 ]
Sharan, Yair [1 ]
机构
[1] Tel Aviv Univ, Interdisciplinary Ctr Technol Anal & Forecasting, Tel Aviv, Israel
来源
FORESIGHT | 2013年 / 15卷 / 05期
关键词
Foresight; Security; Emerging technologies; Future threats; Signals of change; Wild cards;
D O I
10.1108/FS-05-2012-0036
中图分类号
TU98 [区域规划、城乡规划];
学科分类号
0814 ; 082803 ; 0833 ;
摘要
Purpose - Many emerging technologies are being developed in an accelerating pace and are key drivers of future change. In foresight studies, usually their positive impact on the quality of life is considered or their negative environmental effects. This paper seeks to draw attention to an overlooked "dark side'' of new technologies: their potential abuse by terrorists or organized crime. Recent cybercrime events are examples of abuse that perhaps could have been minimized if appropriate foresight studies were performed years ago. This was the aim of the recently completed EU-funded project FESTOS. Design/methodology/approach - Several foresight methodologies were employed. Following a horizon scanning for potentially threatening technologies, a Delphi-type expert survey helped to evaluate critical threat characteristics of selected 33 technologies: the likelihood that each technology will actually come to pose a security threat (in different time frames), the easiness of its malicious use, the severity of the threat, and the most threatened societal spheres. Findings - The results enabled ranking the technologies by their "abuse potential'' and "threat intensity''. Certain emerging technologies (or their combinations), regarded as "weak signals'', inspired ideas for potential "wild cards''. In a subsequent workshop, which employed a variant of the "futures wheel'' method, four wild-card" scenario sketches'' were constructed. These were later developed to full narrative scenarios. Originality/value - The entire process enables the introduction of security foresight into policy planning in a long-range perspective. The foresight results were followed by the evaluation of policy implications and coping with the knowledge control dilemma. The paper illustrates how a mix of foresight methods can help in a continuous analysis of new and threats posed by emerging technologies, thus raising awareness of decision makers and mitigating the risk of unforeseen surprises.
引用
收藏
页码:375 / 391
页数:17
相关论文
共 50 条
  • [41] Evolving and Emerging Technologies in Colon and Rectal Surgery Introduction
    Beck, David E.
    CLINICS IN COLON AND RECTAL SURGERY, 2015, 28 (03) : 127 - 127
  • [42] Evolving threats
    不详
    NUCLEAR ENGINEERING INTERNATIONAL, 2017, 62 (752): : 28 - 30
  • [43] Early detection of extremism? The local security professional on assessment of potential threats posed by youth
    van de Weert, Annemarie
    Eijkman, Quirine A. M.
    CRIME LAW AND SOCIAL CHANGE, 2020, 73 (05) : 491 - 507
  • [44] Early detection of extremism? The local security professional on assessment of potential threats posed by youth
    Annemarie van de Weert
    Quirine A.M. Eijkman
    Crime, Law and Social Change, 2020, 73 : 491 - 507
  • [45] Regulating the unregulatable: Policy considerations for the national security threats posed by advances in genetic engineering
    Bonheyo, George
    Omberg, Kristin
    Rodda, Kabrena
    Hund, Gretchen
    Frazar, Sarah
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2016, 252
  • [46] Innovative security technologies against insider threats and data leakage
    You, Ilsun
    Ogiela, Marek R.
    Woungang, Isaac
    Yim, Kangbin
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (02) : 236 - 238
  • [47] A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures
    Swessi, Dorsaf
    Idoudi, Hanen
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1557 - 1592
  • [48] ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds
    Gao, Xing
    Gu, Zhongshu
    Kayaalp, Mehmet
    Pendarakis, Dimitrios
    Wang, Haining
    2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 237 - 248
  • [49] A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures
    Dorsaf Swessi
    Hanen Idoudi
    Wireless Personal Communications, 2022, 124 : 1557 - 1592
  • [50] Addressing social resistance in emerging security technologies
    Mitchener-Nissen, Timothy
    FRONTIERS IN HUMAN NEUROSCIENCE, 2013, 7